Skip to content

Added Komga OIDC and Calibre-Web LDAP SSO Documentation#4139

Closed
Avsynthe wants to merge 6 commits intogoauthentik:mainfrom
Avsynthe:main
Closed

Added Komga OIDC and Calibre-Web LDAP SSO Documentation#4139
Avsynthe wants to merge 6 commits intogoauthentik:mainfrom
Avsynthe:main

Conversation

@Avsynthe
Copy link
Contributor

@Avsynthe Avsynthe commented Dec 2, 2022

Changes

New Features

  • Adds SSO documentation for Komga and Calibre-Web

Avsynthe and others added 5 commits December 2, 2022 21:50
Created OIDC SSO settings for Komga

Signed-off-by: Avsynthe <102600593+Avsynthe@users.noreply.github.com>
This reverts commit b03a84a, reversing
changes made to c02669d.
Signed-off-by: Avsynthe <102600593+Avsynthe@users.noreply.github.com>
@netlify
Copy link

netlify bot commented Dec 2, 2022

Deploy Preview for authentik ready!

Name Link
🔨 Latest commit 18f7d88
🔍 Latest deploy log https://app.netlify.com/sites/authentik/deploys/6389f736a80bee0008ee47af
😎 Deploy Preview https://deploy-preview-4139--authentik.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify site settings.

@codecov
Copy link

codecov bot commented Dec 2, 2022

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 92.82%. Comparing base (860c85d) to head (18f7d88).
Report is 5946 commits behind head on main.

Additional details and impacted files
@@           Coverage Diff           @@
##             main    #4139   +/-   ##
=======================================
  Coverage   92.82%   92.82%           
=======================================
  Files         474      474           
  Lines       23225    23225           
=======================================
  Hits        21557    21557           
  Misses       1668     1668           
Flag Coverage Δ
e2e 53.90% <ø> (ø)
integration 27.54% <ø> (ø)
unit 89.39% <ø> (ø)

Flags with carried forward coverage won't be shown. Click here to find out more.

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

Copy link
Member

@BeryJu BeryJu left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Missing a couple minor things, also add the docs to the sidebar here https://github.com/goauthentik/authentik/blob/153bd3aaf1519eef7a7699e8b314b5652dbc8df1/website/sidebarsIntegrations.js

(Also normally it would be preferred to create a PR per service, just for the future)


The following placeholder will be used:

- `ldapservice` is the username of the authentik admin user you'd like to use for Calibre-Web to connect.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Missing the FQDN of authentik, calibre and the ldap outpost (see https://goauthentik.io/integrations/services/jellyfin/#what-is-jellyfin)


- `ldapservice` is the username of the authentik admin user you'd like to use for Calibre-Web to connect.

Create an application for Calibre-Web in authentik and follow the Forward auth documentation here https://goauthentik.io/docs/providers/proxy/forward_auth
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Missing instructions for the LDAP application

Create an application in authentik. Create an OAuth2/OpenID provider with the following parameters:

- Client Type: Confidential
- Scopes: OpenID, Email and Profile
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- Scopes: OpenID, Email and Profile

These scopes are the default so this is redundant

@OddMagnet
Copy link
Contributor

Found this PR while trying to add OAuth2 to Komga, will you fix the minor issues @Avsynthe ?
Or should I go ahead and create a seperate one for Komga?
(I'm a complete Authentik noob, so the most I can do is OAuth2 with what I found here, lol)

@Aterfax
Copy link
Contributor

Aterfax commented Dec 20, 2024

FYI - the Komga documentation when followed appears to give "invalid_id_token" - so there may be a need to update this with specifics for SpringBoot if something has changed.

Edit: This seems to have been getting stuck for me because I also set the "Encryption Key" as well as the "Signing Key".

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants